Vulnerabilities > Rpath

DATE CVE VULNERABILITY TITLE RISK
2008-11-17 CVE-2008-4832 Link Following vulnerability in Rpath Initscripts 8.128.21/8.56.150.1
rc.sysinit in initscripts 8.12-8.21 and 8.56.15-0.1 on rPath allows local users to delete arbitrary files via a symlink attack on a directory under (1) /var/lock or (2) /var/run.
local
rpath CWE-59
6.9
2008-07-10 CVE-2008-3139 Information Exposure vulnerability in multiple products
The RTMPT dissector in Wireshark (formerly Ethereal) 0.99.8 through 1.0.0 allows remote attackers to cause a denial of service (crash) via unknown vectors.
network
low complexity
rpath wireshark CWE-200
5.0
2008-07-10 CVE-2008-3138 Information Exposure vulnerability in multiple products
The (1) PANA and (2) KISMET dissectors in Wireshark (formerly Ethereal) 0.99.3 through 1.0.0 allow remote attackers to cause a denial of service (application stop) via unknown vectors.
network
low complexity
rpath wireshark CWE-200
5.0
2008-05-22 CVE-2007-5962 Resource Management Errors vulnerability in multiple products
Memory leak in a certain Red Hat patch, applied to vsftpd 2.0.5 on Red Hat Enterprise Linux (RHEL) 5 and Fedora 6 through 8, and on Foresight Linux and rPath appliances, allows remote attackers to cause a denial of service (memory consumption) via a large number of CWD commands, as demonstrated by an attack on a daemon with the deny_file configuration option.
7.1
2008-05-12 CVE-2008-2140 Cross-Site Request Forgery (CSRF) vulnerability in Rpath Appliance Platform Agent 2/3
Cross-site request forgery (CSRF) vulnerability in the rootpw plugin in rPath Appliance Platform Agent 2 and 3 allows remote attackers to reset the root password as the administrator via a crafted URL.
network
high complexity
rpath CWE-352
2.6
2008-05-12 CVE-2008-2139 Permissions, Privileges, and Access Controls vulnerability in Rpath Appliance Platform Agent 2/3
The rootpw plugin in rPath Appliance Platform Agent 2 and 3 does not re-validate requests from a browser with a valid administrator session, including requests to change the password, which makes it easier for physically proximate attackers to gain privileges and maintain control over the administrator account.
high complexity
rpath CWE-264
6.5
2008-02-29 CVE-2008-1078 Link Following vulnerability in multiple products
expn in the am-utils and net-fs packages for Gentoo, rPath Linux, and other distributions, allows local users to overwrite arbitrary files via a symlink attack on the expn[PID] temporary file.
local
low complexity
gentoo rpath CWE-59
7.2
2008-02-28 CVE-2008-0411 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Ghostscript 0/8.0.1/8.15
Stack-based buffer overflow in the zseticcspace function in zicc.c in Ghostscript 8.61 and earlier allows remote attackers to execute arbitrary code via a postscript (.ps) file containing a long Range array in a .seticcspace operator.
6.8
2007-11-07 CVE-2007-5116 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in multiple products
Buffer overflow in the polymorphic opcode support in the Regular Expression Engine (regcomp.c) in Perl 5.8 allows context-dependent attackers to execute arbitrary code by switching from byte to Unicode (UTF) characters in a regular expression.
7.5
2007-10-28 CVE-2007-5686 Permissions, Privileges, and Access Controls vulnerability in Rpath Linux 1
initscripts in rPath Linux 1 sets insecure permissions for the /var/log/btmp file, which allows local users to obtain sensitive information regarding authentication attempts.
local
low complexity
rpath CWE-264
4.9